Hi
Fortgate 3240C v5.2.7
Windows Server 2012R2 running Collector agent v5.0.0247
Various Win 7 & 8 clients and Macs
Due to having a number of Macs on our domain I can't use DC agents as when users authenticate on the Macs the collector agent does not pick them up. So I need to use the second option "Check Windows Security Event logs", however when I use this option all I see is a list
However with the second option selected I don't see any login events instead I just see any entry in collector log:
08/23/2016 15:36:45 [ 5888] logon event(29506): len:54 dc_ip:x.x.x.x time:1471963005 len:41 data:server-name/KEEPALIVE/Polling ip:255.255.255.255
With the option set to "Poll logon sessions using Windows NetAPI" I can see the logon events in the log file:
action:update_entry workstation:x.x.x.x ip:x.x.x.x:0.0.0.0 user:OCC\<user name>
I have been through and checked open ports on the servers, service account etc with no luck.
Any ideas as to why the second option is not working?
Thanks
Ian
Web: www.activatelearning.ac.uk
Twitter: twitter.com/activate_learn
Facebook: facebook.com/Activate-Learning
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
What happens when using the Polling Event logs with WMI option (third one)? This one is the recommended option to use.
Are there errors in the Windows Server event logs visible?
Are you sure the agent is installed with an account that has enough permissions to read the event log? Maybe try a full domain admin account as a test to ensure this is not the issue.
Also there is a newer agent available that can be used, namely v5.0.0250 (which can be found in the download map for 5.2.8).
Also there are some requirements that are not that easy to find. For example, all workstations have to be resolvable in DNS by the agent, and remote registry has to be enabled via ports 139 or 445. This only applies to Windows machines, I don't know if this works with Macs.
Hello,
if I got it correctly then when you do WinSec polling you do not see any users in FSSO user list on Collector.
If so, then check if monitored/polled DCs actually do audit logon events. It is common issue that audit is disabled and so WinSec do not contain necessary data. I would start there.
See GPO screenshot from my lab Win2008-R2 - https://dl.dropboxusercontent.com/u/25571346/2008_WIN_Audit_Sec_Events_HowTo.png
Tomas Stribrny - NASDAQ:FTNT - Fortinet Inc. - TAC Staff Engineer
AAA, MFA, VoIP and other Fortinet stuff
Hi Tomas,
Can you repost the dropbox link please?
Cheers
Shaun
https://www.dropbox.com/s..._Events_HowTo.jpg?dl=0
Tomas Stribrny - NASDAQ:FTNT - Fortinet Inc. - TAC Staff Engineer
AAA, MFA, VoIP and other Fortinet stuff
Hello,
Is this case solved. Can you help me?
-> I checked this parameters,
--> fortigate verison is 6.4.8
--> fsso version is 5.0.0302_x64
--> fsso user is admin
Hey oghuzan,
thanks for sharing the information. Can you elaborate a little?
- have you tried the different polling methods? (WMI, NetAPI)
- if yes, did any of them work?
- have you verified that your domain controllers are auditing login events?
-> the domain controllers must have login events in their windows security event logs in the first place for Collector Agent to pick up anything
- are you polling only some or all domain controllers in your environment?
- do you get any errors in the Collector Agent debug log?
- do you get any users in the Login User List on Collector Agent?
Hey,
you might want to specify your question. The thread here is past its fifth birthday, it is unlikely that this is the same issue. Many things, even on AD side have changed.
Best regards,
Markus
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
227 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.